Sciweavers

468 search results - page 56 / 94
» Computationally Feasible Automated Mechanism Design: General...
Sort
View
ICTAI
2009
IEEE
14 years 3 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
CIKM
2010
Springer
13 years 7 months ago
Components for information extraction: ontology-based information extractors and generic platforms
Information Extraction (IE) has existed as a field for several decades and has produced some impressive systems in the recent past. Despite its success, widespread usage and comm...
Daya C. Wimalasuriya, Dejing Dou
APSCC
2009
IEEE
14 years 3 months ago
Selecting Web services based on past user experiences
Since the Internet of Services (IoS) is becoming reality, there is an inherent need for novel service selection mechanisms, which work in spite of large numbers of alternative ser...
Philipp Leitner, Anton Michlmayr, Florian Rosenber...
INFOCOM
2011
IEEE
12 years 12 months ago
Strategyproof auctions for balancing social welfare and fairness in secondary spectrum markets
Abstract—Secondary spectrum access is emerging as a promising approach for mitigating the spectrum scarcity in wireless networks. Coordinated spectrum access for secondary users ...
Ajay Gopinathan, Zongpeng Li, Chuan Wu
VLSID
2007
IEEE
131views VLSI» more  VLSID 2007»
14 years 8 months ago
Defect-Aware Synthesis of Droplet-Based Microfluidic Biochips
Recent advances in microfluidics technology have led to the emergence of miniaturized biochip devices for biochemical analysis. A promising category of microfluidic biochips relie...
Tao Xu, Krishnendu Chakrabarty, Fei Su